Page(s) : 1 ... 751 752 753 754 755 756 757 758 759 760 [761] 762 763 764 765 766 767 768 769 770 771 ... | Result(s) : 300103 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
N/A | 2025-03-11 | CVE-2025-2021 | cve | Ashlar-Vellum Cobalt XE File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected insta... |
N/A | 2025-03-11 | CVE-2025-2022 | cve | Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected install... |
N/A | 2025-03-11 | CVE-2025-2023 | cve | Ashlar-Vellum Cobalt LI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected insta... |
4.8 | 2025-03-11 | CVE-2025-2208 | cve | A vulnerability, which was classified as problematic, has been found in aitangbao springboot-manager 3.0. This issue affects some unknown processing of the file /sysFiles/upload... |
N/A | 2025-03-11 | CVE-2025-25680 | cve | LSC Smart Connect LSC Indoor PTZ Camera 7.6.32 is contains a RCE vulnerability in the tuya_ipc_direct_connect function of the anyka_ipc process. The vulnerability allows arbitra... |
N/A | 2025-03-11 | CVE-2025-25747 | cve | Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup par... |
N/A | 2025-03-11 | CVE-2025-27601 | cve | Umbraco is a free and open source .NET content management system. An improper API access control issue has been identified Umbraco's API management package prior to version... |
N/A | 2025-03-11 | CVE-2025-27602 | cve | Umbraco is a free and open source .NET content management system. In versions of Umbraco's web backoffice program prior to versions 10.8.9 and 13.7.1, via manipulation of b... |
N/A | 2025-03-11 | CVE-2025-27617 | cve | Pimcore is an open source data and experience management platform. Prior to version 11.5.4, authenticated users can craft a filter string used to cause a SQL injection. Version ... |
4.8 | 2025-03-11 | CVE-2024-56338 | cve | IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.3 is vulnerable to cross-site scripting. This vulnerability allows a privileged us... |
N/A | 2025-03-11 | CVE-2024-9157 | cve | ** UNSUPPORTED WHEN ASSIGNED ** A privilege escalation vulnerability in CxUIUSvc64.exe and CxUIUSvc32.exe of Synaptics audio drivers allows a local authorized attacker to load... |
N/A | 2025-03-11 | CVE-2025-0149 | cve | Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access. |
7.8 | 2025-03-11 | CVE-2025-21169 | cve | Substance3D - Designer versions 14.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the c... |
N/A | 2025-03-11 | CVE-2025-21180 | cve | Heap-based buffer overflow in Windows exFAT File System allows an unauthorized attacker to execute code locally. |
6.7 | 2025-03-11 | CVE-2025-21199 | cve | Improper privilege management in Azure Agent Installer allows an authorized attacker to elevate privileges locally. |
4.3 | 2025-03-11 | CVE-2025-21247 | cve | Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network. |
N/A | 2025-03-11 | CVE-2025-22213 | cve | Inadequate checks in the Media Manager allowed users with "edit" privileges to change file extension to arbitrary extension, including .php and other potentially executable exte... |
8.1 | 2025-03-11 | CVE-2025-24035 | cve | Sensitive data storage in improperly locked memory in Windows Remote Desktop Services allows an unauthorized attacker to execute code over a network. |
7.5 | 2025-03-11 | CVE-2025-24043 | cve | Improper verification of cryptographic signature in .NET allows an authorized attacker to execute code over a network. |
7.8 | 2025-03-11 | CVE-2025-24044 | cve | Use after free in Windows Win32 Kernel Subsystem allows an authorized attacker to elevate privileges locally. |
Page(s) : 1 ... 751 752 753 754 755 756 757 758 759 760 [761] 762 763 764 765 766 767 768 769 770 771 ... | Result(s) : 300103 |